Security Plus Chapter 1

12345678910111213141516
Across
  1. 2. Network that moves a product from its creation to the end-user
  2. 5. Safeguard employed within an enterprise to protect the CIA of information
  3. 6. Controls that provide an alternative to normal controls
  4. 9. Businesses that furnish solutions or services to users and organizations
  5. 12. Threat actors who are strongly motivated by philosophical or political beliefs.
  6. 13. no unauthorized person or malicious software has altered the data
  7. 15. unauthorized copying of data
  8. 16. Threat actors who are employed by their own government to carry out attacks.
Down
  1. 1. Software in which no additional processes
  2. 3. pose a threat from the position of a trusted entity
  3. 4. Vulnerability for which there are no days of advanced warning
  4. 5. mitigate or lessen the damage caused by the incident
  5. 7. outsourcing the responsibility of a IT resources
  6. 8. End of a product’s manufacturing lifespan
  7. 10. Process of bypassing corporate approval for technology purchases
  8. 11. Erroneous technology settings.
  9. 14. Individual or entity who is responsible for attacks